Searched for: +
(1 - 20 of 52)

Pages

Communication efficient privacy-preserving distributed optimization using adaptive differential quantization
Communication efficient privacy-preserving distributed optimization using adaptive differential quantization
Privacy-Friendly De-Authentication with BLUFADE
Privacy-Friendly De-Authentication with BLUFADE: Blurred Face Detection
Characterising AI Weakness in Detecting Personal Data from Images By Crowds
Characterising AI Weakness in Detecting Personal Data from Images By Crowds
Blockchain-based solutions for privacy in the Internet of Things Smart Environment
Blockchain-based solutions for privacy in the Internet of Things Smart Environment
A Survey on the Privacy-Preserving Applications of Secure Transformation in Collaborative Supply Chains
A Survey on the Privacy-Preserving Applications of Secure Transformation in Collaborative Supply Chains
Security and Privacy of Overlay-based ICN/IPCoexistence Approaches
Security and Privacy of Overlay-based ICN/IPCoexistence Approaches
Understanding Security and Privacy Characteristics ofHybrid-based IP-ICN Coexistence Architectures
Understanding Security and Privacy Characteristics ofHybrid-based IP-ICN Coexistence Architectures
Mitigating Inference Attacks in Collaborative Credit Card Fraud Detection using Secure Multi-Party Selection
Mitigating Inference Attacks in Collaborative Credit Card Fraud Detection using Secure Multi-Party Selection
Towards user-oriented privacy for recommender system data
Towards user-oriented privacy for recommender system data: A personalization-based approach to gender obfuscation for user profiles
The ethical application of biometric facial recognition technology
The ethical application of biometric facial recognition technology
Anonymous and Verifiable Reputation System for E-commerce Platforms based on Blockchain
Anonymous and Verifiable Reputation System for E-commerce Platforms based on Blockchain
Investigating the effect of security and privacy on IoT device purchase behaviour
Investigating the effect of security and privacy on IoT device purchase behaviour
Privacy-Preserving Data Aggregation with Probabilistic Range Validation
Privacy-Preserving Data Aggregation with Probabilistic Range Validation
Accurate Differentially Private Deep Learning on the Edge
Accurate Differentially Private Deep Learning on the Edge
Privacy-Preserving Data Aggregation with Probabilistic Range Validation
Privacy-Preserving Data Aggregation with Probabilistic Range Validation
Information availability and data breaches
Information availability and data breaches: Data breach notification laws and their effects
Core Values and Value Conflicts in Cybersecurity: Beyond Privacy Versus Security
Core Values and Value Conflicts in Cybersecurity: Beyond Privacy Versus Security
Someone really wanted that song but it was not me!
Someone really wanted that song but it was not me!: Evaluating Which Information to Disclose in Explanations for Group Recommendations
Sovereignty, privacy, and ethics in blockchain-based identity management systems
Sovereignty, privacy, and ethics in blockchain-based identity management systems
Perception of privacy in a university building
Perception of privacy in a university building: The transparency paradox
Searched for: +
(1 - 20 of 52)

Pages